Results 41 to 50 of about 3,059,535 (353)

Use of a hybrid intelligence decision tree to identify mature B‐cell neoplasms

open access: yesCytometry Part B: Clinical Cytometry, EarlyView., 2023
Abstract Background Mature B‐cell neoplasms are challenging to diagnose due to their heterogeneity and overlapping clinical and biological features. In this study, we present a new workflow strategy that leverages a large amount of flow cytometry data and an artificial intelligence approach to classify these neoplasms. Methods By combining mathematical
Inès Vergnolle   +4 more
wiley   +1 more source

Authentic Interpretation of the Constitution in the Croatian Parliamentary Law

open access: yesLaw and political science, 2022
Having in mind that the authentic interpretation is an interpretation of a legal norm that, due to its ambiguity or misinterpretation in practice, is provided by the same body that enacted it, the paper examines whether Croatian parliamentary law empowers the Croatian Parliament, as a constitution-maker, for giving an authentic interpretation of the ...
openaire   +2 more sources

Probability on groups and an application to cryptography [PDF]

open access: yesComputer Science Journal of Moldova, 2015
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye   +2 more
doaj  

PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]

open access: yes, 2013
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal   +7 more
core   +2 more sources

Will Requirements for Last Wills Remain as They Are? The ‘Physical Presence Requirement’ of Witnesses and Notaries in the Light of the COVID-19 Interim Measures and the EU Freedom of (Notarial) Services

open access: yesUtrecht Law Review, 2021
The COVID-19-crisis has exposed the shortcomings of formal requirements for legal acts which involve the physical presence of others. This is in particular true with regard to last wills which require the physical presence of a notary and/or witnesses ...
J. W. A. Biemans
doaj   +1 more source

Legal Principle of Authentication Power of Authentic Deed Becomes Private Deed Due to Age Limit for Notary Appearers

open access: yesJournal of Law Policy and Globalization, 2021
Besides having to obey the Law on Notary Position and the Code of Ethics, a Notary must pay attention to certain principles, one of which is the Precautionary Principle.
Natasha Meydia Essiva
semanticscholar   +1 more source

Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal

open access: yesInformation, 2021
Fighting crime in cyberspace requires law enforcement authorities to immerse in a digital ocean of vast amount of information and also to acquire and objectify the evidence of criminal activity.
Christos Karagiannis, Kostas Vergidis
doaj   +1 more source

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2019
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová   +2 more
doaj   +1 more source

Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models

open access: yesJournal of Digital Technologies and Law, 2023
Objective: to specify the models of legal regulation in the sphere of biometric identification and authentication with facial recognition technology in order to elaborate recommendations for increasing information security of persons and state-legal ...
D. Utegen, B. Zh. Rakhmetov
doaj   +1 more source

Home - About - Disclaimer - Privacy